/external/boringssl/src/crypto/x509/ |
x_algor.c | 78 int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype, void *pval) 80 if (!alg) 84 if (alg->parameter == NULL) 85 alg->parameter = ASN1_TYPE_new(); 86 if (alg->parameter == NULL) 89 if (alg) 91 if (alg->algorithm) 92 ASN1_OBJECT_free(alg->algorithm); 93 alg->algorithm = (ASN1_OBJECT*) aobj; 99 if (alg->parameter [all...] |
/external/openssh/ |
digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg = 0; digests[alg].id != -1; alg++) [all...] |
digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) [all...] |
digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
hmac.h | 22 size_t ssh_hmac_bytes(int alg); 26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
|
hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf [all...] |
/external/vboot_reference/tests/ |
gen_test_keys.sh | 39 alg=$((${key_index} * 3 + ${alg_index})) 45 --algorithm ${alg} 51 --algorithm ${alg}
|
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 104 public tmpKey(String alg, byte[] enc) { 105 this.alg = alg; 114 return alg; 126 public tmp1Key(String alg, byte[] enc) {
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 110 public tmpKey(String alg, byte[] enc) { 111 this.alg = alg; 118 return alg; 127 public tmp1Key(String alg, byte[] enc) {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 198 String alg = validValues[i].concat(post); local 199 kpG = KeyPairGenerator.getInstance(alg); 201 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 237 String alg = validValues[i].concat(post); local 239 KeyPairGenerator.getInstance(alg, prov); 241 .concat(alg).concat(")")); 246 String alg = validValues[i].concat(post); local 249 KeyPairGenerator.getInstance(alg, invalidValues[j]); 251 .concat(alg).concat(" provider: ").concat( 259 String alg = validValues[i].concat(post) local 296 String alg = validValues[i].concat(post); local 306 String alg = validValues[i].concat(post); local [all...] |
KSPrivateKeyEntryTest.java | 188 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 191 return alg; 207 alg = algorithm;
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 202 String alg = validValues[i].concat(post); local 203 kpG = KeyPairGenerator.getInstance(alg); 205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 241 String alg = validValues[i].concat(post); local 243 KeyPairGenerator.getInstance(alg, prov); 245 .concat(alg).concat(")")); 250 String alg = validValues[i].concat(post); local 253 KeyPairGenerator.getInstance(alg, invalidValues[j]); 255 .concat(alg).concat(" provider: ").concat( 263 String alg = validValues[i].concat(post) local 300 String alg = validValues[i].concat(post); local 310 String alg = validValues[i].concat(post); local [all...] |
KeyPairGenerator3Test.java | 140 String[] alg = {null, "", "AsDfGh!#$*", "DSA", "RSA"}; local 143 for (int i = 0; i < alg.length; i++) { 145 kpg = new MykeyPGen(alg[i]); 158 public MykeyPGen(String alg) { 159 super(alg);
|
KSPrivateKeyEntryTest.java | 180 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 183 return alg; 199 alg = algorithm;
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbe.c | 79 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 121 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 134 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 145 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/vboot_reference/utility/ |
dev_make_keypair | 11 Usage: ${0##*/} BASENAME [ALG] 17 If specified, ALG is one of: 32 If ALG is not specified, a default value will be used. 47 local alg=$2 48 local len=$(alg_to_keylen $alg) 63 --algorithm $alg 69 --algorithm $alg
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 129 String alg = null; local 133 alg = daOid + "with" + deaOid; 135 sig = Signature.getInstance(alg); 141 alg = daName + "with" + deaName; 143 sig = Signature.getInstance(alg); 150 alg = deaOid; 152 sig = Signature.getInstance(alg); 157 alg = deaName; 159 sig = Signature.getInstance(alg);
|
AlgNameMapper.java | 81 // Maps alg name to OID 83 // Maps OID to alg name 85 // Maps aliases to alg names 93 // map upper case alg name to its original name 107 // Alg.Alias.<service>.<OID-INTS-DOT-SEPARATED>=<alg-name> 109 // Alg.Alias.<service>.OID.<OID-INTS-DOT-SEPARATED>=<alg-name> 179 // Alg.Alias.<service>.<OID-INTS-DOT-SEPARATED>=<alg-name 191 String alg = (String)me.getValue(); local 212 algAliasesMap.put(alias.toUpperCase(Locale.US), alg); local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 264 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { 268 if (alg == NULL || 269 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 270 alg->parameter->type != V_ASN1_SEQUENCE) { 274 p = alg->parameter->value.sequence->data; 275 plen = alg->parameter->value.sequence->length; 279 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, 287 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE) { 290 p = alg->parameter->value.sequence->data [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
SecurityAgreeHeader.java | 67 * Set Algorithm (alg parameter) 68 * @param alg - algorithm value 71 public void setAlgorithm(String alg) throws ParseException; 139 * @return alg parameter value
|
/external/vboot_reference/scripts/keygeneration/ |
common.sh | 59 local alg=$2 61 local len=$(alg_to_keylen $alg) 78 --algorithm $alg 84 --algorithm $alg
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 50 int alg; member in struct:privsep_cmd_set_key
|